Vulnerability Name: | CVE-2004-0467 (CCN-19094) | ||||||||
Assigned: | 2004-12-31 | ||||||||
Published: | 2004-12-31 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | Juniper JUNOS 5.x through JUNOS 7.x allows remote attackers to cause a denial of service (routing disabled) via a large number of MPLS packets, which are not filtered or verified before being sent to the Routing Engine, which reduces the speed at which other packets are processed. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Denial of Service | ||||||||
References: | Source: MITRE Type: CNA CVE-2004-0467 Source: CCN Type: SA14049 Juniper JUNOS Unspecified Packet Processing Denial of Service Source: SECUNIA Type: UNKNOWN 14049 Source: CCN Type: SECTRACK ID: 1013039 Juniper JUNOS Unspecified Packet Processing Error Lets Remote Users Deny Service Source: SECTRACK Type: UNKNOWN 1013039 Source: CCN Type: US-CERT VU#409555 Juniper JunOS Routing Engine MPLS denial of service Source: CERT-VN Type: Patch, Third Party Advisory, US Government Resource VU#409555 Source: CONFIRM Type: Patch, Third Party Advisory, US Government Resource http://www.kb.cert.org/vuls/id/JSHA-68ZJCQ Source: MISC Type: Patch, Vendor Advisory http://www.niscc.gov.uk/niscc/docs/al-20050126-00067.html?lang=en Source: CCN Type: OSVDB ID: 13196 Juniper Junos Unspecified Packet Processing Remote DoS Source: REDHAT Type: UNKNOWN RHSA-2005:081 Source: BID Type: Patch 12379 Source: CCN Type: BID-12379 Juniper Networks JUNOS Unspecified Remote Denial Of Service Vulnerability Source: XF Type: UNKNOWN junos-dos(19094) Source: XF Type: UNKNOWN junos-dos(19094) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |